Change-Id: I0ea1db71b382cc6a72a87564e5bdd1f8d534ee02
Reviewed-on: http://photon-jenkins.eng.vmware.com:8082/4015
Reviewed-by: Sharath George
Tested-by: Sharath George
1 | 1 |
deleted file mode 100644 |
... | ... |
@@ -1,34 +0,0 @@ |
1 |
-diff -ru openssl-1.0.2h/crypto/bn/bn_print.c openssl-1.0.2h-modified/crypto/bn/bn_print.c |
|
2 |
-+++ openssl-1.0.2h-modified/crypto/bn/bn_print.c 2016-09-20 15:41:13.789132068 -0700 |
|
3 |
-@@ -111,6 +111,7 @@ |
|
4 |
- char *p; |
|
5 |
- BIGNUM *t = NULL; |
|
6 |
- BN_ULONG *bn_data = NULL, *lp; |
|
7 |
-+ int bn_data_num; |
|
8 |
- |
|
9 |
- /*- |
|
10 |
- * get an upper bound for the length of the decimal integer |
|
11 |
-@@ -120,8 +121,8 @@ |
|
12 |
- */ |
|
13 |
- i = BN_num_bits(a) * 3; |
|
14 |
- num = (i / 10 + i / 1000 + 1) + 1; |
|
15 |
-- bn_data = |
|
16 |
-- (BN_ULONG *)OPENSSL_malloc((num / BN_DEC_NUM + 1) * sizeof(BN_ULONG)); |
|
17 |
-+ bn_data_num = num / BN_DEC_NUM + 1; |
|
18 |
-+ bn_data = OPENSSL_malloc(bn_data_num * sizeof(BN_ULONG)); |
|
19 |
- buf = (char *)OPENSSL_malloc(num + 3); |
|
20 |
- if ((buf == NULL) || (bn_data == NULL)) { |
|
21 |
- BNerr(BN_F_BN_BN2DEC, ERR_R_MALLOC_FAILURE); |
|
22 |
-@@ -143,7 +144,11 @@ |
|
23 |
- i = 0; |
|
24 |
- while (!BN_is_zero(t)) { |
|
25 |
- *lp = BN_div_word(t, BN_DEC_CONV); |
|
26 |
-+ if (*lp == (BN_ULONG)-1) |
|
27 |
-+ goto err; |
|
28 |
- lp++; |
|
29 |
-+ if (lp - bn_data >= bn_data_num) |
|
30 |
-+ goto err; |
|
31 |
- } |
|
32 |
- lp--; |
|
33 |
- /* |
34 | 1 |
deleted file mode 100644 |
... | ... |
@@ -1,28 +0,0 @@ |
1 |
-From 2b4029e68fd7002d2307e6c3cde0f3784eef9c83 Mon Sep 17 00:00:00 2001 |
|
2 |
-From: "Dr. Stephen Henson" <steve@openssl.org> |
|
3 |
-Date: Fri, 19 Aug 2016 23:28:29 +0100 |
|
4 |
-Subject: [PATCH] Avoid overflow in MDC2_Update() |
|
5 |
- |
|
6 |
-Thanks to Shi Lei for reporting this issue. |
|
7 |
- |
|
8 |
-CVE-2016-6303 |
|
9 |
- |
|
10 |
-Reviewed-by: Matt Caswell <matt@openssl.org> |
|
11 |
-(cherry picked from commit 55d83bf7c10c7b205fffa23fa7c3977491e56c07) |
|
12 |
- crypto/mdc2/mdc2dgst.c | 2 +- |
|
13 |
- 1 file changed, 1 insertion(+), 1 deletion(-) |
|
14 |
- |
|
15 |
-diff --git a/crypto/mdc2/mdc2dgst.c b/crypto/mdc2/mdc2dgst.c |
|
16 |
-index 6615cf8..2dce493 100644 |
|
17 |
-+++ b/crypto/mdc2/mdc2dgst.c |
|
18 |
-@@ -91,7 +91,7 @@ int MDC2_Update(MDC2_CTX *c, const unsigned char *in, size_t len) |
|
19 |
- |
|
20 |
- i = c->num; |
|
21 |
- if (i != 0) { |
|
22 |
-- if (i + len < MDC2_BLOCK) { |
|
23 |
-+ if (len < MDC2_BLOCK - i) { |
|
24 |
- /* partial block */ |
|
25 |
- memcpy(&(c->data[i]), in, len); |
|
26 |
- c->num += (int)len; |
27 | 1 |
new file mode 100644 |
... | ... |
@@ -0,0 +1,36 @@ |
0 |
+From 31c8b265591a0aaa462a1f3eb5770661aaac67db Mon Sep 17 00:00:00 2001 |
|
1 |
+From: Rich Salz <rsalz@openssl.org> |
|
2 |
+Date: Tue, 22 Aug 2017 11:44:41 -0400 |
|
3 |
+Subject: [PATCH] Avoid out-of-bounds read |
|
4 |
+ |
|
5 |
+Fixes CVE 2017-3735 |
|
6 |
+ |
|
7 |
+Reviewed-by: Kurt Roeckx <kurt@roeckx.be> |
|
8 |
+(Merged from https://github.com/openssl/openssl/pull/4276) |
|
9 |
+ |
|
10 |
+(cherry picked from commit b23171744b01e473ebbfd6edad70c1c3825ffbcd) |
|
11 |
+--- |
|
12 |
+ crypto/x509v3/v3_addr.c | 10 ++++++---- |
|
13 |
+ 1 file changed, 6 insertions(+), 4 deletions(-) |
|
14 |
+ |
|
15 |
+diff --git a/crypto/x509v3/v3_addr.c b/crypto/x509v3/v3_addr.c |
|
16 |
+index 1290dec9bb8..af080a04f2b 100644 |
|
17 |
+--- a/crypto/x509v3/v3_addr.c |
|
18 |
+@@ -130,10 +130,12 @@ static int length_from_afi(const unsigned afi) |
|
19 |
+ */ |
|
20 |
+ unsigned int v3_addr_get_afi(const IPAddressFamily *f) |
|
21 |
+ { |
|
22 |
+- return ((f != NULL && |
|
23 |
+- f->addressFamily != NULL && f->addressFamily->data != NULL) |
|
24 |
+- ? ((f->addressFamily->data[0] << 8) | (f->addressFamily->data[1])) |
|
25 |
+- : 0); |
|
26 |
++ if (f == NULL |
|
27 |
++ || f->addressFamily == NULL |
|
28 |
++ || f->addressFamily->data == NULL |
|
29 |
++ || f->addressFamily->length < 2) |
|
30 |
++ return 0; |
|
31 |
++ return (f->addressFamily->data[0] << 8) | f->addressFamily->data[1]; |
|
32 |
+ } |
|
33 |
+ |
|
34 |
+ /* |
... | ... |
@@ -1,7 +1,7 @@ |
1 | 1 |
Summary: Management tools and libraries relating to cryptography |
2 | 2 |
Name: openssl |
3 | 3 |
Version: 1.0.2l |
4 |
-Release: 1%{?dist} |
|
4 |
+Release: 2%{?dist} |
|
5 | 5 |
License: OpenSSL |
6 | 6 |
URL: http://www.openssl.org |
7 | 7 |
Group: System Environment/Security |
... | ... |
@@ -13,6 +13,7 @@ Patch0: c_rehash.patch |
13 | 13 |
Patch1: openssl-1.0.2f-ipv6apps.patch |
14 | 14 |
Patch2: openssl-init-conslidate.patch |
15 | 15 |
Patch3: openssl-drbg-default-read-system-fips.patch |
16 |
+Patch4: openssl-CVE-2017-3735.patch |
|
16 | 17 |
%if %{with_check} |
17 | 18 |
BuildRequires: zlib-devel |
18 | 19 |
%endif |
... | ... |
@@ -56,6 +57,7 @@ Perl scripts that convert certificates and keys to various formats. |
56 | 56 |
%patch1 -p1 |
57 | 57 |
%patch2 -p1 |
58 | 58 |
%patch3 -p1 |
59 |
+%patch4 -p1 |
|
59 | 60 |
|
60 | 61 |
%build |
61 | 62 |
export CFLAGS="%{optflags}" |
... | ... |
@@ -115,6 +117,8 @@ rm -rf %{buildroot}/* |
115 | 115 |
/%{_bindir}/c_rehash |
116 | 116 |
|
117 | 117 |
%changelog |
118 |
+* Tue Oct 10 2017 Vinay Kulkarni <kulkarniv@vmware.com> 1.0.2l-2 |
|
119 |
+- Fix CVE-2017-3735 OOB read. |
|
118 | 120 |
* Fri Aug 11 2017 Anish Swaminathan <anishs@vmware.com> 1.0.2l-1 |
119 | 121 |
- Upgrade to 1.0.2l |
120 | 122 |
* Thu Aug 10 2017 Chang Lee <changlee@vmware.com> 1.0.2k-4 |